Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

170-010 Exam Dumps - Brocade Certified vRouter Engineer

Question # 4

Which three commands should be used to modify a firewall rulebase? (Choose three.)

A.

edit

B.

set

C.

rename

D.

delete

E.

modify

Full Access
Question # 5

vyatta@VYA1:~$ show ip route ospf

O 192.168.12.0/24 [110/1] is directly connected, eth2, 00:07:36

O 192.168.13.0/24 [110/1] is directly connected, eth3, 00:07:36

O *> 192.168.23.0/24 [110/2] via 192.168.12.2, eth2, 00:05:05

*> [110/2] via 192.168.13.3, eth3, 00:05:05

O 192.168.101.0/24 [110/1] is directly connected, eth1, 00:07:36

O *> 192.168.128.0/24 [110/2] via 192.168.12.2, eth2, 00:05:53

O *> 192.168.129.2/32 [110/11] via 192.168.12.2, eth2, 00:05:53

O *> 192.168.130.2/32 [110/11] via 192.168.12.2, eth2, 00:05:53

O *> 192.168.131.2/32 [110/11] via 192.168.12.2, eth2, 00:05:53

O *> 192.168.160.0/24 [110/2] via 192.168.13.3, eth3, 00:05:05

O *> 192.168.161.3/32 [110/11] via 192.168.13.3, eth3, 00:05:05

O *> 192.168.162.3/32 [110/11] via 192.168.13.3, eth3, 00:05:05

O *> 192.168.163.3/32 [110/11] via 192.168.13.3, eth3, 00:05:05

vyatta@VYA1:~$ show ip route summary

IP routing table name is Default-IP-Routing-Table(0)

IP routing table maximum-paths is 8

Route Source Networks

connected 7

static 1

ospf 9

Total 17

FIB 9

vyatta@VYA1:~$

With all routing settings at system defaults, which statement is true about the interface VYA1 will use to transmit traffic destined for 192.168.23.15?

A.

Only interface Ethernet 2 will be used.

B.

Only interface Ethernet 3 will be used.

C.

The Brocade Vyatta device will load-balance packet by packet out both Ethernet 2 and Ethernet 3.

D.

The Brocade Vyatta device will load-balance session by session out both Ethernet 2 and Ethernet 3.

Full Access
Question # 6

When you enable OSPF protocol monitoring, where is the protocol data stored?

A.

in /var/log/messages

B.

in the protocol log

C.

in /syslog/logs

D.

on the syslog server

Full Access
Question # 7

You want to capture all traffic traversing an Ethernet switch on your workstation for protocol monitoring.

What must you do?

A.

Connect your workstation to a VLAN trunk port on the switch.

B.

Place the card on your workstation into promiscuous mode.

C.

Connect your workstation to an analyzer port on the switch.

D.

Configure the switch to forward all traffic to your switch port.

Full Access
Question # 8

vyatta@VYA1:~$ show ip ospf neighbor

OSPF process 0:

Neighbor ID Pri State Dead Time Address Interface

192.168.131.2 1 Full/Backup 00:00:38 192.168.12.2 eth2

192.168.163.3 1 Init/DROther 00:00:33 192.168.13.3 eth3

vyatta@VYA1:~$

10.1.16

vyatta@VYA1:~$ show ip ospf database

OSPF Router with ID (172.24.42.51) (Process ID 0)

Router Link States (Area 0.0.0.0)

Link ID ADV Router Age Seq# CkSum Link count

172.24.42.51 172.24.42.51 167 0x80000008 0xa98e 3

172.24.42.52 172.24.42.52 166 0x80000006 0x21e7 3

172.24.42.53 172.24.42.53 6 0x8000000b 0x7854 3

172.24.42.54 172.24.42.54 7 0x80000003 0x1183 4

Net Link States (Area 0.0.0.0)

Link ID ADV Router Age Seq# CkSum

192.168.12.1 172.24.42.51 327 0x80000002 0x92e8

192.168.13.3 172.24.42.53 32 0x80000002 0x6d08

192.168.23.3 172.24.42.53 602 0x80000002 0x0d5d

192.168.160.3 172.24.42.53 10 0x80000003 0x3e9f

AS External Link States

Link ID ADV Router Age Seq# CkSum Route Tag

0.0.0.0 172.24.42.51 187 0x80000003 0x04a1 E2 0.0.0.0/0 254

vvyatta@VYA1:~$

Which statement describes the status shown in the output?

A.

The device is exchanging link-state information with the peer on eth3.

B.

The device has not formed an adjacency with the peer on eth3.

C.

The device is negotiating the designated router for eth3.

D.

The device is running the SPF algorithm.

Full Access
Question # 9

Which three statements about the configuration file are true? (Choose three.)

A.

The file is organized hierarchically.

B.

The file is named config.boot.

C.

The system only supports one active configuration file.

D.

You cannot delete the file.

E.

The file is encrypted.

Full Access
Question # 10

Which two steps are required to enable logging of firewalled packets? (Choose two.)

A.

Enable logging on the firewall rulebase.

B.

Enable logging on the firewall rule.

C.

Enable sufficient disk space for any potential logged information.

D.

Enable debug-level logging on the device.

Full Access
Question # 11

Which operation allows a firewall to understand complex protocols and pass related traffic automatically?

A.

statefulness

B.

application layer gateway

C.

access list

D.

allow related traffic

Full Access
Question # 12

vyatta@vyatta:~$ show ip route

Codes: K - kernel route, C - connected, S - static, R - RIP, O - OSPF,

I - ISIS, B - BGP, > - selected route, * - FIB route

S>* 0.0.0.0/0 [1/0] via 10.1.1.1, eth0

C>* 127.0.0.0/8 is directly connected, lo

S>* 192.168.12.0/24 [120/0] via 192.168.101.2, eth1

S> 192.168.12.0/24 [1/0] via 192.168.103.3, eth3

Referring to the exhibit, which three statements are true? (Choose three.)

A.

Interface eth3 is administratively disabled.

B.

The administrator has configured two static routes to network 192.168.12.0/24.

C.

The route with the best administrative distance to network 192.168.12.0/24 is through eth3.

D.

The route through eth1 is a floating static route.

E.

Interface eth1 is administratively disabled.

Full Access